Opportunistic Bandwidth Sharing for Virtual Network Mapping

Size: px
Start display at page:

Download "Opportunistic Bandwidth Sharing for Virtual Network Mapping"

Transcription

1 Opportunistic Bandwidth Sharing for Virtual Network Mapping Sheng Zhang, Zhuzhong Qian, Bin Tang, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department of Computer and Information Sciences, Temple University, USA Abstract Network virtualization has emerged as a powerful way to fend off the current ossification of the Internet. A major challenge is virtual network mapping, which is to assign substrate resources to virtual networks (VNs) such that some predefined constraints are satisfied and substrate resources are utilized in an effective and efficient manner. Due to the NP-completeness of this problem, a variety of heuristic algorithms have been proposed. However, existing solutions rarely consider the inefficient utilization of bandwidth resources due to the network traffic fluctuation. In this paper, we study the opportunistic bandwidth sharing in a single physical link among multiple virtual links from different VNs. We formulate the problem of assigning time slots to dispensable sub-flows with constraints on the performance guarantee and the objective of minimizing the number of time slots used, as an optimization problem. Two heuristic algorithms and I, which consider the problem from different perspectives, are presented. Extensive simulations are conducted to evaluate the effectiveness and efficiency of our algorithms. Index Terms virtual network embedding; opportunistic bandwidth sharing; Chernoff bound; NP-complete I. Introduction Due to the competing policies and interests of its stakeholders, the deployment of new technologies in the Internet is painfully slow. Network virtualization [1 4] has emerged as a promising approach to overcome this problem. In network virtualization, traditional Internet service providers (ISPs) are divided into : infrastructure providers (InPs) who maintain physical/substrate networks (SNs), and service providers (SPs) who purchase resources from multiple individual InPs to build logical service networks, known as virtual networks (VNs), on top of substrate networks and offer customized value-added services to end users. This decoupling not only brings flexibility of deployment of new architectures, but also provides diversity of services in a competitive environment. One of the fundamental problems in network virtualization is the virtual network embedding/mapping (VNE) problem, which maps each virtual node/link to a physical node/path such that (i) some predefined constraints are satisfied and (ii) SN resources are utilized in an effective and efficient manner. As the VNE problem is proven NP-complete [5], many heuristic algorithms [6 11] have been proposed. Conventional VNE algorithms allocate dedicated bandwidth resources to virtual links, however, the allocated bandwidth is not fully utilized due to the network traffic fluctuation, as shown in Auckland Data Trace [12]. In this case, the SP wastes the purchased resources, and the InP loses potential customers. Opportunistic spectrum access [13], which is proven to be an effective way of making full use of the frequency spectrum, gives us some inspirations: idle bandwidth in one virtual link can be utilized by other virtual links. That is, we could allocate bandwidth according to traffic fluctuations in virtual links and allow several virtual links share certain common bandwidth to achieve efficient utilization. We use opportunistic bandwidth sharing to denote this concept; this is different from the traditional bandwidth sharing where bandwidth is shared among concurrent flows [14], i.e., multiplexing. In this paper, we study the opportunistic bandwidth sharing in a single physical link among multiple virtual links from different VNs. We formulate the optimization problem called the collision restricted assignment (CRA), which assigns time slots to dispensable sub-flows to minimize the number of time slots used. Two heuristic algorithms and I are presented to address this problem. adopts a greedy approach, which is similar to first-fit [15]. In I, we relax CRA by the Chernoff bound [16], then prove the NPcompleteness of the converted problem, called the expectation restricted assignment (ERA) problem, and develop heuristics based on relaxation and first-fit. Simulations are conducted to evaluate the effectiveness and efficiency of our algorithms. Our contributions are summarized as follows: (i) To the best of our knowledge, this is the first attempt to apply opportunistic bandwidth sharing in VNE and provide the formulation. (ii) We propose two heuristic algorithms and I to address CRA from two different perspectives. The remainder of this paper is organized as follows. Section II provides the basic model and problem formulation. An optimal solution is given in Section III. and I are presented and analyzed in Sections IV and V. Our simulation results are presented in Section VI. We overview the related work in Section VII and conclude this paper in Section VIII. A. The Model II. Preliminaries We consider a substrate link S L shared among multiple virtual links VL i. Each virtual link VL i is associated with a flow f i, and flows on different virtual links are assumed to be independent of each other. To leverage the benefit of opportunistic bandwidth sharing, we assume that the bandwidth sharing in the substrate network is based on time division multiplexing (TDM), where the whole time is partitioned into

2 Fig. 1 shows a feasible assignment. ts 1 is assigned to three sub-flows, d f 1, d f 2 and d f 3, because they collide with a probability.64 (by Eq. (1)), which is less then p th =.1. ts 3 can not be assigned to d f 2 and d f 4 simultaneously, because the collision probability is.3.4 =.12 > p th. Fig. 1. An illustration of assignment of time slots to dispensable sub-flows multiple frames with equal length, and each frame is further divided into L equal time slots, ts 1, ts 2,..., ts L. As it is difficult to capture the characteristics of network traffic fluctuation, we use a simplified model: each flow f i is composed of a basic sub-flow b f i, which exists all the time, and a dispensable sub-flow d f i, which occurs with a probability p i. We denote b i and d i as the number of time slots in each frame required by b f i and d f i, respectively. B. Problem Formulation Now we consider the time slot allocation by an InP for opportunistic bandwidth sharing in a substrate link. Generally, in order to obtain more profit, the InP wants the substrate link to be shared by as many flows as possible. To achieve this, multiple dispensable sub-flows are allowed to share a common time slot with opportunities, while for each basic sub-flow, the InP has no choice but to allocate the required number of slots. So we will only consider dispensable sub-flows in the sequel. To save time slots for upcoming flows, we prefer that each time slot can be assigned to as many dispensable sub-flows as possible, thereby, increasing its utilization. However, when more than one dispensable sub-flows occur at the same slot, a collision happens, which would bring down transmission performance. Let X i indicate whether dispensable sub-flow d f i occurs, i.e., Pr[X i = 1] = p i. For each time slot k, let D k denote the set of dispensable sub-flows it is assigned to, and let Y k = i D k X i. Then, the probability of a collision happening at slot k, denoted by PC(D k ), is: PC(D k ) = Pr[Y k 1] = 1 (1 p i ) (p i i D k i D k j D k, j i (1 p j )) (1) To break the utilization-collision tradeoff, we assume that the probability of a collision happening at each time slot can never go beyond a given threshold p th. Our objective is to minimize the number of time slots used by all of the dispensable sub-flows. Problem 1: (Collision Restricted Assignment, CRA) Given a set of n dispensable sub-flows d f i, i = 1, 2,..., n, each requires d i time slots with probability p i, and a threshold p th. Find an assignment of time slots to these dispensable subflows to minimize the number of time slots used, such that: 1) for each dispensable sub-flow d f i, the number of time slots assigned to it is at least d i ; 2) for each assigned time slot, the collision probability at that time slot is no more than p th. III. Optimal Solution Inspired by the cutting stock problem 1, we first present an alternate formulation which can remove all of the collision constraints. A pattern, is defined as a set of dispensable subflows, such that even when a single time slot is assigned to all of these dispensable sub-flows simultaneously, the probability of a collision does not go beyond the threshold p th. For each possible pattern j, let x j represent the times that pattern j appears in a feasible assignment. Then, CRA can be formulated as the following integer linear programming (ILP): min s.t. h j=1 x j h a ji x j d i, i : 1, 2,..., n j=1 x j, nonnegative integer, j : 1, 2,..., h In the above, h is the number of all possible patterns, and a ji indicates whether d f i is included in pattern j. Generally, Eq. (2) can be optimally solved using intelligent exhaustive search approaches, such as backtracking and branch-and-bound [18]. However, when every p i is very small, the number of possible patterns can be exponentially large, which will cost time to construct these patterns and to solve the ILP. Thus, the ILP-based approach is difficult to be applied in practice. In the next two sections, we develop two practical heuristic algorithms. IV. Heuristic I: Collision Restricted First-Fit When each dispensable sub-flow requires one single time slot, i.e., d i = 1 for all i, we note that CRA is very similar to bin packing 2. The only difference is that, in bin packing, the occupied size in each bin is the sum of sizes of all packed items; in CRA however, the collision probability in a time slot is not linear (nor multiplicative) of the occurring probabilities of those dispensable sub-flows the time slot is assigned to. First-fit is a straightforward heuristic algorithm with an approximation factor of 2 for bin packing. Items are considered in an arbitrary order, and for each item, first-fit attempts to place the item in the first bin that can accommodate the item. If not, the item is put into a new bin. As first-fit can be executed online and has a low time complexity, we use the core idea of first-fit to heuristically solve CRA due to their similarities. The heuristic algorithm is shown in Algorithm 1. 1 Cutting stock problem [17]: Given a number of rolls of paper of fixed width waiting to be cut, yet different customers want different numbers of rolls of various-sized widths, find a cutting method to minimize the waste. 2 Bin packing [15]: Given n items with sizes s 1,s 2,...,s n (, 1], find a packing method in unit-sized bins that minimizes the number of bins used. (2)

3 Here, Collision(ts pos, d f i ) is a function that returns the probability of collision at ts pos if ts pos is assigned to d f i. To calculate the collision probability efficiently, we adopt the following approach. Let D k be the set of dispensable sub-flows that the time slot k is currently assigned to. Also let: A(D k ) = (1 p i ) and B(D k ) = (p i (1 p j )), i D k i D k j D k, j i then the collision probability PC(D k ) = 1 A(D k ) B(D k ). When slot k is to be assigned to a new sub-flow d f l, then: A(D k {d f l }) = A(D k )(1 p l ) B(D k {d f l }) = B(D k )(1 p l ) + A(D k )p l (3) which can be used to calculate the new collision probability. Algorithm 1 The 1st Heuristic Algorithm for CRA: INPUTS: d 1, p 1, d 2, p 2,..., d n, p n, and p th For each dispensable sub-flow d f i : let count While(count < d i ) Let pos While(Collision(ts pos, d f i ) > p th ) pos pos + 1 Assign ts pos to d f i count count + 1 V. Heuristic II: Expectation Restricted First-Fit As there are many substrate links that need to handle bandwidth sharing, we should keep the time slot assignment algorithm as simple as possible. Although the calculation of collision probability is much faster by Eq. (3) than Eq. (1), it still requires five addition and three multiplication operations. Hence, we propose another heuristic algorithm based on Chernoff bound [16], which only uses one addition operation. Theorem 1: let D k denote the set of dispensable sub-flows time slot k is assigned to, the probability of collision will be no more than p th if µe 1 µ p th, where µ = E[Y] = E[ i D k X i ], X i indicates d f i, and e is the exponential constant. Proof: PC(D k ) = Pr[Y > 1] Pr[Y 1] = Pr[Y (1 + δ)µ] (Let δ = 1 µ 1 > ) e δ ( (1 + δ) ) 1+δ = µe 1 µ The theorem follows immediately. µ (Chernoff bound) Theorem 1 reveals a relationship between µ th and p th, which we use to modify the CRA problem by changing the constraint on collision to capacity at each frame, and later show the new problem is NP-complete. Problem 2: (Expectation Restricted Assignment, ERA) Given a set of n dispensable sub-flows d f i, i = 1, 2,..., n, each requires d i time slots with probability p i, and a threshold p th. Find an assignment of time slots to these dispensable subflows to minimize the number of time slots used, such that: 1) for each dispensable sub-flow d f i, the number of time slots assigned to it is at least d i ; 2) for each ts k, the expectation of number of sub-flows ts k is assigned to is no more than µ th. Theorem 2: The ERA problem is NP-complete. Proof: Given an instance of bin packing, we construct a corresponding instance of ERA by letting µ th be the bin size, p 1, p 2,..., p n be the sizes of n items, respectively, and d i = 1 for i. In doing so, we reduce bin backing to a special case of ERA and prove ERA to be NP-hard. It is also easy to see that ERA is in NP, and therefore, ERA is NP-complete. Up to now, the original CRA problem has been transformed into the ERA problem and we have proven it to be NPcomplete. From the proof, we immediately obtain a solution to CRA by solving ERA with first-fit, as shown in Algorithm 2. The calculation of expectation is linear, which takes only one addition operation when a new dispensable sub-flow comes. Hence, I runs faster than. Algorithm 2 The 2nd Heuristic Algorithm for CRA: I INPUTS: d 1, p 1, d 2, p 2,..., d n, p n, and µ th For each dispensable sub-flow d f i : let count While(count < d i ) Let pos While(Expectation(ts pos, d f i ) > µ th ) pos pos + 1 Assign ts pos to d f i count count + 1 On the other hand, the relaxation may decrease the number of dispensable sub-flows one time slot can be assigned to, which can lead to a performance degradation. To characterize the relaxation gap, we depict the relationship between µ th and p th in Fig. 2(a). We notice that µ th is smaller than p th, which indicates that the relaxation by Theorem 1 may not be tight, i.e., bandwidth can not be fully utilized if we do nothing more than using first-fit to solve the ERA problem. We use the following example for illustration: suppose ts k is assigned to n independent sub-flows, each occurring with the same probability p, then the probability of collision is: Pr[collision] = 1 (1 p) n np(1 p) n 1 (4) The expectation of the number of sub-flows is E[X] = np. Fig. 2(b) shows the values of Pr[collision] and E[X] for n = 1, 2,..., 1, from which we note that E[X] is much larger than Pr[collision] for the same n. For each E[X], we obtain a value of p th by Theorem 1. Table I gives a comparison of E[X], Pr[collision] (we use Pr[c] in the table) and p th. For instance, when n = 2 and p =.1, then E[X] = 2.1 =.2, Pr[collision] = 1 (1.1) (1.1) =.1, p th E[X]e 1 E[X] =.445, which means that, if we use E[X] =.2 as the bin size, we only guarantee that collision occurs with a probability no more than.445. In fact, this probability is about.1 or much smaller than.445.

4 4 15 I(1) 4 15 I(1) 5 5 (a) µ th p th (b) n collision and n expectation Fig. 2. (a) shows the relationship between µ th and p th, while (b) illustrates Pr[collision] and E[X] TABLE I The Relaxation Gap p =.1 p =.2 n E[X] Pr[c] p th E[X] Pr[c] p th Fig. 3. (a) p i (.5,.1) (b) p i (.5,.2) vs. Time(ms) of runs Fig. 4. I(1) Comparison of running time The main reason behind the above scenario is, mutual independence is considered in CRA while ERA ignores it because of the linearity of expectation. To make up the relaxation gap, we replace µ th by λµ th in I, i.e., Expectation(ts pos, d f i ) > λµ th. Here, λ 1 is used to control tradeoff. VI. Performance Evaluation In this section, we first describe our evaluation settings, and then present the main evaluation results. A. Evaluation Settings Comparing our algorithms with previous work on virtual network mapping is difficult because (i) it is the first attempt to use opportunistic bandwidth sharing in virtual network mapping, and (ii) we concentrate on the scenario of a single substrate link. Therefore, our evaluation focuses primarily on quantifying the benefits of opportunistic bandwidth sharing, comparing with I, and determining λ. In our simulations (For more evaluations on other combinations of inputs, please refer to our supplemental materials, available online [19]), we let the number of slots required by each dispensable sub-flow be uniformly distributed from 2 to H, i.e., H is the higher bound of d i. We uniformly generate p i from two intervals:.5 to.1 and.5 to.2. To guarantee the delivery of packets with a high probability, we assume that p th is.1. Every data point is the average of 1, runs. B. Evaluation Results We first evaluate the effect of the number of dispensable sub-flows on the number of time slots used, as showed in Fig. 3. Here we let H be 1 and HA II(x) stands for HA II with λ = x. The number of dispensable sub-flows ranges from 1 to with an increment of 1. The total slots represents the total number of slots required by all of the dispensable sub-flows, and is also the number of time slots used if there is no opportunistic bandwidth sharing. We also can see that opportunistic bandwidth sharing brings more efficient bandwidth utilization and that the larger λ is, the more bandwidth is saved. Another interesting point is that, the data points are linear in shape, which indicates that the number of slots used and the number of dispensable sub-flows have linear relationships. As we expected, a larger λ in I leads to more possible combinations of dispensable sub-flows and further improves the effect of opportunistic bandwidth sharing; thus the slope of each line gets smaller when λ gets larger. We find that achieves almost the same effect as, but I is faster than. Fig. 4 shows the time of 1, runs of and I with H = 3. We notice that is faster than other λ settings. The main reason is that, one time slot can be assigned to more dispensable sub-flows when λ grows up, so the average pos in I becomes smaller. We also notice that the gap between and I becomes larger as the number of dispensable sub-flows increases. Considering both time consumptions and results, is better than. Fig. 5 shows the effect of the higher bound of d i, i.e. H, on the number of time slots used. The number of dispensable subflows is set to be 5. H ranges from 5 to 5 with an increment of 5. From these two figures, we also notice that opportunistic bandwidth sharing leads to notable improvement on bandwidth utilization and requires nearly the same slots as HA- I. Furthermore, we find that more slots are required when the average of p i becomes larger. Next, we try to find the empirical value for λ. In our simulations, we find that the collision occurs with a probability higher than p th =.1, i.e., the constraint is violated, when λ is set to 15 or larger in Figs. 3(a), 3(b), 5(a) and 5(b). Through

5 I(1) (a) p i (.5,.1) Fig I(1) (b) p i (.5,.2) vs. Higher bound of d i more evaluations (see our supplemental materials [19]), we find the maximal allowable λ is about 1 when p th =.2, and around 8 when p th =.3. To explain that, we let the maximal value of p i is p max and let: 1 (1 p max ) x xp max (1 p max ) x 1 = p th Therefore, the maximal allowable λ can be calculated by λµ th = xp max. Here, λ can be used to achieve a tradeoff between bandwidth utilization and transmission performance. To sum up, bandwidth utilization can be more efficient with opportunistic bandwidth sharing. I is more flexible and less time-consuming than ; the value of λ can be approximately calculated and used to achieve tradeoff between efficiency and performance. A. Network Virtualization VII. Related Work In networking literature, virtual private networks (VPNs) and overlay networks share some similarities with network virtualization. They all deal with selecting nodes to construct paths. The differences are: (i) the mapping of nodes are predetermined in VPN while it is not in VNE [7, 8], (ii) only link constraints are considered in VPN while both link and node constraints are considered in VNE [7, 8], and (iii) overlays are designed in the application layer on top of IP [4]. B. Virtual Network Embedding A significant body of research has investigated techniques for the VNE problem. Some work [7, 9] focused on the offline problem, where all VN requests are known in advance. Exclusive use of substrate nodes was considered in [6]. Attention was paid to embedding with guaranteed load balancing in [7]. A subgraph isomorphism detection based backtracking algorithm was proposed in [11]. Multi-path routing support and migration were envisioned in [1]. Linear programming and rounding were used to solve the location-based mapping problem in [8]. Some other research, such as [2], focused on distributed embedding protocols/architectures. VIII. Conclusions This paper focuses on how to assign bandwidth resources to multiple virtual links in a single substrate link with the help of opportunistic bandwidth sharing. To the best of our knowledge, it is the first attempt that combines virtual networking mapping with opportunistic bandwidth sharing. We formulate the problem as an optimization problem and develop two heuristic algorithms, and I. The effectiveness and efficiency of our algorithms are confirmed by simulations. For future work, we plan to investigate CRA with more realistic parameters such as using continuous random variables to represent flows and combine opportunistic bandwidth sharing at the entire network level. Acknowledgments The authors would like to thank Yitong Yin, Daoxu Chen, and Zhuo Li for their invaluable suggestions. This work is supported in part by the National NSF of China under Grant No and No ; Key Project of Jiangsu Research Program under Grant No.BE21179 under Grant No. BE21179; the National 973 Basic Research Program of China under Grant No. 9CB3275 and No. 211CB328; US NSF grants ECCS , CNS , CCF , CNS , and CCF References [1] J. Turner and D. Taylor, Diversifying the Internet, in IEEE GLOBE- COM 5, vol. 2, 2-2 5, pp. 6 pp. 76. [2] T. Anderson, L. Peterson, S. Shenker, and J. Turner, Overcoming the Internet impasse through virtualization, Computer, vol. 38, no. 4, pp , april 5. [3] N. Feamster, L.-X. Gao, and J. Rexford, How to lease the Internet in your spare time, ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 1, 7. [4] N. Chowdhury and R. Boutaba, A survey of network virtualization, Computer Networks, vol. 54, no. 5, pp , 21. [5] D. G. Andersen, Theoretical approaches to node assignment, Dec. 2, unpublished Manuscript. [6] R. Ricci, C. Alfeld, and J. Lepreau, A solver for the network testbed mapping problem, ACM SIGCOMM Comput. Commun. Rev., vol. 33, no. 2, 3. [7] Y. Zhu and M. Ammar, Algorithms for assigning substrate network resources to virtual network components, in IEEE INFOCOM 6, april 6, pp [8] N. Chowdhury, M. Rahman, and R. Boutaba, Virtual network embedding with coordinated node and link mapping, in IEEE INFOCOM 9, , pp [9] J. Lu and J. Turner, Efficient mapping of virtual networks onto a shared substrate, Washington University, Tech. Rep. WUCSE-6-35, 6. [1] M. Yu, Y. Yi, J. Rexford, and M. Chiang, Rethinking virtual network embedding: substrate support for path splitting and migration, ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, 8. [11] J. Lischka and H. Karl, A virtual network mapping algorithm based on subgraph isomorphism detection, in ACM VISA 9. New York, NY, USA: ACM, 9, pp [12] Auckland Data Trace. [13] Q. Zhao and B. Sadler, A survey of dynamic spectrum access, IEEE Signal Processing Magazine,, vol. 24, no. 3, pp , May 7. [14] L. Massoulie and J. Roberts, Bandwidth sharing: objectives and algorithms, IEEE/ACM TON, vol. 1, no. 3, pp , 2. [15] V. V. Vazirani, Approximation Algorithms. Berlin: Springer, 3. [16] H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations, Annals of Mathematical Statistics, vol. 23, no. 4, pp , [17] P. C. Gilmore and R. E. Gomory, A linear programming approach to the cutting-stock problem, Operations Research, vol. 9, [18] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. The MIT Press, September 1. [19] Suppl. Materials to Opportunistic Bandwidth Sharing for Virtual Network Mapping. sheng/resource/suppl.pdf. [2] C. Marquezan, J. Nobre, L. Granville, G. Nunzi, D. Dudkowski, and M. Brunner, Distributed reallocation scheme for virtual network resources, in IEEE ICC 9, , pp. 1 5.

Minimizing bottleneck nodes of a substrate in virtual network embedding

Minimizing bottleneck nodes of a substrate in virtual network embedding Minimizing bottleneck nodes of a substrate in virtual network embedding Adil Razzaq, Peter Sjödin, Markus Hidell School of ICT, KTH-Royal Institute of Technology Stockholm, Sweden {arazzaq, psj, mahidell}@

More information

Virtual Network Embedding with Substrate Support for Parallelization

Virtual Network Embedding with Substrate Support for Parallelization Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya

More information

VNE-Sim: A Virtual Network Embedding Simulator

VNE-Sim: A Virtual Network Embedding Simulator VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,

More information

Resource analysis of network virtualization through user and network

Resource analysis of network virtualization through user and network Resource analysis of network virtualization through user and network P.N.V.VAMSI LALA, Cloud Computing, Master of Technology, SRM University, Potheri. Mr.k.Venkatesh, Asst.Professor (Sr.G), Information

More information

A Prediction-based Dynamic Resource Management Approach for Network Virtualization

A Prediction-based Dynamic Resource Management Approach for Network Virtualization A Prediction-based Dynamic Resource Management Approach for Network Virtualization Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xuesong Qiu State Key Laboratory of Networking and Switching Technology

More information

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science

More information

Device-to-Device Networking Meets Cellular via Network Coding

Device-to-Device Networking Meets Cellular via Network Coding Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Nabeel Farooq Butt 1, Mosharaf Chowdhury 2, and Raouf Boutaba 13 1 David R. Cheriton School of Computer Science University

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

MODERN communication networks are constructed

MODERN communication networks are constructed 1000 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011 Cross-Layer Survivability in WDM-Based Networks Kayi Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, and Hyang-Won Lee, Member,

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm Xinliang LV, Xiangwei ZHENG, and Hui ZHANG School of Information Science and Engineering Shandong Normal University, 250014, Jinan, CHINA Abstract

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost Enrique Dávalos 1 and Benjamín Barán Universidad Nacional de Asunción, Facultad Politécnica

More information

Cascaded Coded Distributed Computing on Heterogeneous Networks

Cascaded Coded Distributed Computing on Heterogeneous Networks Cascaded Coded Distributed Computing on Heterogeneous Networks Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT,

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei

More information

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction Journal of the Korean Institute of Industrial Engineers Vol. 32, No. 3, pp. 219-225, September 2006. An Integer Programming Approach to Packing Lightpaths on WDM Networks Kyungsik Lee 1 Taehan Lee 2 Sungsoo

More information

Connectivity-aware Virtual Network Embedding

Connectivity-aware Virtual Network Embedding Connectivity-aware Virtual Network Embedding Nashid Shahriar, Reaz Ahmed, Shihabur R. Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba Jeebak Mitra, Feng Zeng Outline Survivability in Virtual Network Embedding

More information

Overcoming the Internet Impasse through Virtualization Thomas Anderson, Larry Peterson, Scott Shenker, Jonathan Turner. 원종호 (INC lab) Sep 25, 2006

Overcoming the Internet Impasse through Virtualization Thomas Anderson, Larry Peterson, Scott Shenker, Jonathan Turner. 원종호 (INC lab) Sep 25, 2006 Overcoming the Internet Impasse through Virtualization Thomas Anderson, Larry Peterson, Scott Shenker, Jonathan Turner 원종호 (INC lab) Sep 25, 2006 Outline Introduction Three requirements Virtualization

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS. Yujiao Cheng, Houfeng Huang, Gang Wu, Qing Ling

DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS. Yujiao Cheng, Houfeng Huang, Gang Wu, Qing Ling DISTRIBUTED NETWORK RESOURCE ALLOCATION WITH INTEGER CONSTRAINTS Yuao Cheng, Houfeng Huang, Gang Wu, Qing Ling Department of Automation, University of Science and Technology of China, Hefei, China ABSTRACT

More information

SEA: Stable Resource Allocation in Geographically Distributed Clouds

SEA: Stable Resource Allocation in Geographically Distributed Clouds SEA: Stable Resource Allocation in Geographically Distributed Clouds Sheng Zhang, Zhuzhong Qian, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department

More information

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding

More information

Link Scheduling in Multi-Transmit-Receive Wireless Networks

Link Scheduling in Multi-Transmit-Receive Wireless Networks Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017 SURVIVABLE VNE By Sedef Savas Networks Lab, May 25, 2017 1 SURVEY ON SURVIVABLE VIRTUAL NETWORK EMBEDDING PROBLEM AND SOLUTIONS Sandra Herker, Ashiq Khan, Xueli An DOCOMO Communications Laboratories Europe

More information

Scheduling Unsplittable Flows Using Parallel Switches

Scheduling Unsplittable Flows Using Parallel Switches Scheduling Unsplittable Flows Using Parallel Switches Saad Mneimneh, Kai-Yeung Siu Massachusetts Institute of Technology 77 Massachusetts Avenue Room -07, Cambridge, MA 039 Abstract We address the problem

More information

Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, and Zhipeng Cai

Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, and Zhipeng Cai Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, and Zhipeng Cai Department of Computer Science, Georgia State University, ATL, USA School of Electrical and Computer Engineering, Georgia Institute of Technology,

More information

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh,

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

ON WEIGHTED RECTANGLE PACKING WITH LARGE RESOURCES*

ON WEIGHTED RECTANGLE PACKING WITH LARGE RESOURCES* ON WEIGHTED RECTANGLE PACKING WITH LARGE RESOURCES* Aleksei V. Fishkin, 1 Olga Gerber, 1 Klaus Jansen 1 1 University of Kiel Olshausenstr. 40, 24118 Kiel, Germany {avf,oge,kj}@informatik.uni-kiel.de Abstract

More information

Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2

Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2 Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2 X. Zhao 3, P. B. Luh 4, and J. Wang 5 Communicated by W.B. Gong and D. D. Yao 1 This paper is dedicated to Professor Yu-Chi Ho for his 65th birthday.

More information

Virtual Network Mapping based on Subgraph Isomorphism Detection. Jens Lischka, Holger Karl Paderborn University

Virtual Network Mapping based on Subgraph Isomorphism Detection. Jens Lischka, Holger Karl Paderborn University Virtual Network Mapping based on Subgraph Isomorphism Detection Jens Lischka, Holger Karl Paderborn University 2.09.2009 Jens Lischka 1 VNM Problem 2 VNR 1(t 0, 10) PN 6 2 G B C 1 0 α γ 0 0 αa D γe 0 0

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

THE Internet has been extremely successful in supporting

THE Internet has been extremely successful in supporting 816 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 3, MARCH 2014 Virtual Network Embedding with Opportunistic Resource Sharing Sheng Zhang, Student Member, IEEE, Zhuzhong Qian, Member,

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

On the Rectangle Escape Problem

On the Rectangle Escape Problem CCCG 2013, Waterloo, Ontario, August 8 10, 2013 On the Rectangle Escape Problem Sepehr Assadi Ehsan Emamjomeh-Zadeh Sadra Yazdanbod Hamid Zarrabi-Zadeh Abstract Motivated by a PCB routing application,

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

Minimal Test Cost Feature Selection with Positive Region Constraint

Minimal Test Cost Feature Selection with Positive Region Constraint Minimal Test Cost Feature Selection with Positive Region Constraint Jiabin Liu 1,2,FanMin 2,, Shujiao Liao 2, and William Zhu 2 1 Department of Computer Science, Sichuan University for Nationalities, Kangding

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Improving Connectivity via Relays Deployment in Wireless Sensor Networks

Improving Connectivity via Relays Deployment in Wireless Sensor Networks Improving Connectivity via Relays Deployment in Wireless Sensor Networks Ahmed S. Ibrahim, Karim G. Seddik, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks

Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Mohamed Faten Zhani, Raouf Boutaba Institute of

More information

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN Fangting Sun, Mark Shayman Department of Electrical and Computer Engineering University of Maryland,

More information

Rethinking Virtual Network Embedding in Reconfigurable Networks

Rethinking Virtual Network Embedding in Reconfigurable Networks Rethinking Virtual Network Embedding in Reconfigurable Networks Max Curran, Md. Shaifur Rahman, Himanshu Gupta and Vyas Sekar Department of Computer Science, Stony Brook University, NY, USA. Department

More information

Towards Min- Cost Virtual Infrastructure Embedding

Towards Min- Cost Virtual Infrastructure Embedding IEEE GLOBECOM 20, San Diego, CA Arizona State University Yu, ue and Zhang ({ruozhouy, xue, xzhan229}@asu.edu) are all with Arizona State University, Tempe, AZ 828. All correspondences should be addressed

More information

Cutting Stock with Binary Patterns: Arc-flow Formulation with Graph Compression

Cutting Stock with Binary Patterns: Arc-flow Formulation with Graph Compression Cutting Stock with Binary Patterns: Arc-flow Formulation with Graph Compression Filipe Brandão INESC TEC and Faculdade de Ciências, Universidade do Porto, Portugal fdabrandao@dcc.fc.up.pt arxiv:1502.02899v1

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

OPPORTUNISTIC spectrum access (OSA), which is

OPPORTUNISTIC spectrum access (OSA), which is 180 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 6, NO. 2, APRIL 2012 Opportunistic Spectrum Access in Cognitive Radio Networks: Global Optimization Using Local Interaction Games Yuhua Xu,

More information

Guaranteeing User Welfare in Network Service: Comparison of Two Subsidy Schemes

Guaranteeing User Welfare in Network Service: Comparison of Two Subsidy Schemes Guaranteeing User Welfare in Network Service: Comparison of Two Subsidy Schemes Seung Min Yu and Seong Lyun Kim School of Electrical and Electronic Engineering, Yonsei University 5 Yonsei Ro, Seodaemun

More information

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,

More information

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers , October 20-22, 2010, San Francisco, USA Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers I-Lun Tseng, Member, IAENG, Huan-Wen Chen, and Che-I Lee Abstract Longest-path routing problems,

More information

Efficient Mapping of Virtual Networks onto a Shared Substrate

Efficient Mapping of Virtual Networks onto a Shared Substrate Efficient Mapping of Virtual Networks onto a Shared Substrate Jing Lu and Jonathan Turner Department of Computer Science and Engineering Washington University in St. Louis St. Louis, MO 63130 Email: {jl1,

More information

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University

More information

Community-home-based Multi-copy Routing in Mobile Social Networks

Community-home-based Multi-copy Routing in Mobile Social Networks IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:PP NO:99 YEAR 204 Community-home-based Multi-copy Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Zhiyuan Tan, F. Richard Yu, Xi Li, Hong Ji, and Victor C.M. Leung. INFOCOM Workshops 2017 May 1, Atlanta, GA, USA

Zhiyuan Tan, F. Richard Yu, Xi Li, Hong Ji, and Victor C.M. Leung. INFOCOM Workshops 2017 May 1, Atlanta, GA, USA Zhiyuan Tan, F. Richard Yu, Xi Li, Hong Ji, and Victor C.M. Leung INFOCOM Workshops 2017 May 1, Atlanta, GA, USA 1 Background and Motivation System Model Problem Formulation Problem Reformulation and Solution

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

Survivable Virtual Network Embedding

Survivable Virtual Network Embedding Survivable Virtual Network Embedding Muntasir Raihan Rahman 1, Issam Aib 1, and Raouf Boutaba 1,2 1 David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

Joint Backup Capacity Allocation and Embedding for Survivable Virtual Networks

Joint Backup Capacity Allocation and Embedding for Survivable Virtual Networks Joint Backup Capacity Allocation and Embedding for Survivable Virtual Networks Nashid Shahriar, Shihabur R. Chowdhury, Reaz Ahmed, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding

More information

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Ruilong Deng 1,4, Rongxing Lu 1, Chengzhe Lai 2, Tom H. Luan 3, and Hao Liang 4 1: Nanyang Technological University,

More information

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Mihaela Cardei, Jie Wu, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 {mihaela,jie}@cse.fau.edu,

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade

More information

Algorithms for Provisioning Virtual Private Networks in the Hose Model

Algorithms for Provisioning Virtual Private Networks in the Hose Model IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 565 Algorithms for Provisioning Virtual Private Networks in the Hose Model Amit Kumar, Rajeev Rastogi, Avi Silberschatz, Fellow, IEEE, and

More information

Last time(s)?! Network models! Connection provisioning! Part2: Lecture 03! Network Virtualization and SDNs! 25/04/14

Last time(s)?! Network models! Connection provisioning! Part2: Lecture 03! Network Virtualization and SDNs! 25/04/14 Last time(s)? Part2: Lecture 03 Network Virtualization and SDNs Optical nets Spectrum Multiplexing NSA/NSI Lightpaths NDL: network topology description Connection provisioning Network models What do optical

More information

Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore

Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore CCS '08: Proceedings of the 15th ACM conference on Computer and

More information

IN A SEMINAL paper published in 1995, Shenker [18] discussed

IN A SEMINAL paper published in 1995, Shenker [18] discussed 1240 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 6, DECEMBER 2007 Distributed Rate Allocation for Inelastic Flows Prashanth Hande, Shengyu Zhang, and Mung Chiang, Member, IEEE Abstract A common assumption

More information

Network Virtualisation from an Operator Perspective

Network Virtualisation from an Operator Perspective 1 Network Virtualisation from an Operator Perspective 1,2 Márcio Melo, 2 Susana Sargento, 1 Jorge Carapinha 1 Portugal Telecom Inovação, Aveiro, Portugal 2 Universidade de Aveiro, Instituto de Telecomunicações,

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Search for an Immobile Entity on a Unit Graph: A Mathematical Programming Approach

Search for an Immobile Entity on a Unit Graph: A Mathematical Programming Approach Search for an Immobile Entity on a Unit Graph: A Mathematical Programming Approach by Wanyan Yu and Rajan Batta Department of Industrial and Systems Engineering, 438 Bell Hall University at Buffalo (SUNY),

More information

Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems

Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Benjamin Grimmer bdg79@cornell.edu arxiv:1508.05567v2 [cs.ds] 20 Jul 2017 Abstract We consider a variety of NP-Complete network

More information

904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Optimizing Lifetime for Continuous Data Aggregation With Precision Guarantees in Wireless Sensor Networks Xueyan Tang, Member, IEEE,

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths

RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths Hyun Gi Ahn, Tae-Jin Lee, Min Young Chung, and Hyunseung Choo Lambda Networking Center School of Information

More information

Part2: Lecture 02! Network Virtualization!

Part2: Lecture 02! Network Virtualization! Part2: Lecture 02 Network Virtualization Last time? Physical layer Encoding and signaling Fibers Multimode Single mode Multiplexing Time division multiplexing (SONET/SDH) Wavelength division multiplexing

More information

5. Lecture notes on matroid intersection

5. Lecture notes on matroid intersection Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

Speeding Up Evaluation of Powers and Monomials

Speeding Up Evaluation of Powers and Monomials Speeding Up Evaluation of Powers and Monomials (Extended Abstract) Hatem M. Bahig and Hazem M. Bahig Computer Science Division, Department of Mathematics, Faculty of Science, Ain Shams University, Cairo,

More information

Degrees of Freedom in Cached Interference Networks with Limited Backhaul

Degrees of Freedom in Cached Interference Networks with Limited Backhaul Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information

More information

Insensitive Traffic Splitting in Data Networks

Insensitive Traffic Splitting in Data Networks Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages

More information

Memory Placement in Network Compression: Line and Grid Topologies

Memory Placement in Network Compression: Line and Grid Topologies ISITA212, Honolulu, Hawaii, USA, October 28-31, 212 Memory Placement in Network Compression: Line and Grid Topologies Mohsen Sardari, Ahmad Beirami, Faramarz Fekri School of Electrical and Computer Engineering,

More information